General
-
Target
Client3245tt3q45.exe
-
Size
29KB
-
Sample
231113-232c1sfh99
-
MD5
85253b35dcea8e7131541bd1ede1f686
-
SHA1
6c69103a6719fd3c612d992e56eb863b025d7433
-
SHA256
801f056a0d6fa25b60627d51f5c8ef3ad818d7250e7c0d3688b3bcd7e6cba893
-
SHA512
e1fb5c89c78a9ce1cccbecc236b9dd6c16affe5d78b652e9b19b8fb1df43b4c2956ccc864e872d99ed067d3e83f1ed8731586dc38966246132c31a7c1d5813f8
-
SSDEEP
768:GecUMOOo5HCljU0rDdIA/MDMAP79xt3C2hGXbGjD:5MON5KIAUDdT973C2hObg
Static task
static1
Behavioral task
behavioral1
Sample
Client3245tt3q45.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Client3245tt3q45.exe
Resource
win10v2004-20231025-en
Malware Config
Extracted
https://github.com/NGROKC/CTC/raw/main/CTC64.dll
Targets
-
-
Target
Client3245tt3q45.exe
-
Size
29KB
-
MD5
85253b35dcea8e7131541bd1ede1f686
-
SHA1
6c69103a6719fd3c612d992e56eb863b025d7433
-
SHA256
801f056a0d6fa25b60627d51f5c8ef3ad818d7250e7c0d3688b3bcd7e6cba893
-
SHA512
e1fb5c89c78a9ce1cccbecc236b9dd6c16affe5d78b652e9b19b8fb1df43b4c2956ccc864e872d99ed067d3e83f1ed8731586dc38966246132c31a7c1d5813f8
-
SSDEEP
768:GecUMOOo5HCljU0rDdIA/MDMAP79xt3C2hGXbGjD:5MON5KIAUDdT973C2hObg
-
r77 rootkit payload
Detects the payload of the r77 rootkit.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Modifies AppInit DLL entries
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1